Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    11/11/2024, 22:03

General

  • Target

    244d5f8bbb2eb8513152a61ec4a30af6ff895c86e88cb3ce3a612f36c26a0ccf.apk

  • Size

    4.3MB

  • MD5

    a79ecb7c06dee7cf5751c4df8cd58a91

  • SHA1

    3b9cc6ceb09919460d8e479f0e0e1b5ec57ebb4f

  • SHA256

    244d5f8bbb2eb8513152a61ec4a30af6ff895c86e88cb3ce3a612f36c26a0ccf

  • SHA512

    28e38ae1abba91a574107fd746c7ed3d154abb791aebeaa30fa31391ae8297f01a690309c25e0f2a76b21060b670a04cb4d2d949d8821c7d661f29101ed10be1

  • SSDEEP

    98304:YEFIy3BmuqM87fkn889UmapqCfQhvz/+IScmYrMoJ:qy3BmQ8738cb4gIScmvoJ

Malware Config

Extracted

Family

hook

C2

http://154.216.20.101

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Hook family
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 9 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.qimookshl.wwnbiixkm
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4251
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.qimookshl.wwnbiixkm/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.qimookshl.wwnbiixkm/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4281

Network

        MITRE ATT&CK Mobile v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/com.qimookshl.wwnbiixkm/app_dex/classes.dex

          Filesize

          2.9MB

          MD5

          6461bd4f6c9ef733f38ce9013bc82d6e

          SHA1

          eeea400d1c836b3654e08916ef432762705985fc

          SHA256

          f658736aecc5486eceddeb8779521e483574a673f5d42729d0ca20ce6e7e5017

          SHA512

          f639824c3f417293b73ce0e134add0d91925546326612c76af977fb7d77a242d6318c52d7a594d5e5094a43aa70ce7dc50d6c2299a780e2bc33f27cbefe9cdb2

        • /data/data/com.qimookshl.wwnbiixkm/cache/classes.dex

          Filesize

          1.0MB

          MD5

          2eea63ce9803daa044fa32c8ca45d5cc

          SHA1

          5c095c377038806311fffc910360b255388e1df2

          SHA256

          645b209239abbc22e6ca67fc18fb6d26e814d184f5cbd41af7b57b7652ae971e

          SHA512

          26e959d3cd584e032fb493b43bb48b2ab0a9030437ac1a4d67b561499faf60bdf3a8c124b9a90ce104bdd3b29026ed68201d15c69234d6978449c2ea1577ece5

        • /data/data/com.qimookshl.wwnbiixkm/cache/classes.zip

          Filesize

          1.0MB

          MD5

          dcdcaeabe01c19c238050daab1d22e1e

          SHA1

          afbd89df16da87262f035e09d2b1ee10492e12c5

          SHA256

          ced12ec27e5ce290226a1e029d661baac66facfc7a5fb5bb2baa648615a171e9

          SHA512

          67aae6c16c6c259ae7a653727f2cb61ab98334a76c3e2a0b171e048ed502acf5c5d25b5e644abf0b59488eea716fa487057928cd81817ac2a86898989f3a6feb

        • /data/data/com.qimookshl.wwnbiixkm/no_backup/androidx.work.workdb

          Filesize

          4KB

          MD5

          f2b4b0190b9f384ca885f0c8c9b14700

          SHA1

          934ff2646757b5b6e7f20f6a0aa76c7f995d9361

          SHA256

          0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

          SHA512

          ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

        • /data/data/com.qimookshl.wwnbiixkm/no_backup/androidx.work.workdb-journal

          Filesize

          512B

          MD5

          8832e92b2137ec415ac66ea9c179a03a

          SHA1

          b084422531e6b170d7984e969d57668e5dbd7505

          SHA256

          245c9b59edf381077f1909614a0b8ab0b1d400aad7f2f34f00cd6485a8d238bc

          SHA512

          9d30fafc52f4f9df8de76ef51846f2209f86aff82b396ceb9ad58b7764e3815d4086941040e6f70d1a6ee788da5df844f707e52d3ec22c8f4a7ca13fbfd56dcb

        • /data/data/com.qimookshl.wwnbiixkm/no_backup/androidx.work.workdb-shm

          Filesize

          32KB

          MD5

          bb7df04e1b0a2570657527a7e108ae23

          SHA1

          5188431849b4613152fd7bdba6a3ff0a4fd6424b

          SHA256

          c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

          SHA512

          768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

        • /data/data/com.qimookshl.wwnbiixkm/no_backup/androidx.work.workdb-wal

          Filesize

          108KB

          MD5

          6346b3a561da812cce56520358b6b981

          SHA1

          3ae936fd1415307df69b7fa781cde52ddb232071

          SHA256

          f03287f44744c1e2ab536ef15b45a8a89792a35000fe1cb2b7194127f9cebc0d

          SHA512

          eed4be5c571c661bc20fb4d19235ac220d388bbb46570e99b13afaf41fbd65a7a37c8468f210cad46799b2ea2ca58e3e71b878fb21203cce1f1f30f192648ef5

        • /data/data/com.qimookshl.wwnbiixkm/no_backup/androidx.work.workdb-wal

          Filesize

          173KB

          MD5

          59a61f924d75572a01711f2e0ac9eb8e

          SHA1

          428fc36937a68dad45e9c693c7d15c51044096af

          SHA256

          305a1901315bd46e0f9f53dce573ed3ce2d459c1613b56c9357cc83270ae0595

          SHA512

          df85f900f853e2fcaa7e83ef60344156ac0264818dc7118bfacb9f97eaab2d00e43a6d31e9b96dddc113c933d3ceec982e51b93e9d4faec55739ac66edaa6287

        • /data/data/com.qimookshl.wwnbiixkm/no_backup/androidx.work.workdb-wal

          Filesize

          16KB

          MD5

          66c1478cb863c4d6bbad39e42d942739

          SHA1

          b8858d569d27b2fd1ebfd6048d743a064cd55557

          SHA256

          59848a2fa49e695f0933ca83c71542167b4bc3fd674783764565c4bb591e7047

          SHA512

          4789f7dbc1341ffa9ca7a5e0226a2c1c5c86e215a9af7ef9a86d661238201a49a8270b8d80681196607c4ec1dada539236409bb801d71c42c3f66eff9c83c1d0

        • /data/user/0/com.qimookshl.wwnbiixkm/app_dex/classes.dex

          Filesize

          2.9MB

          MD5

          6273514396d4d5f4c13e4099340b392c

          SHA1

          018e61beb93361bc910727aec8ff7fc3976ec10f

          SHA256

          ea1a5525cbdbe8453676364bb77267e0ab08761eb1dcbdd9bcc6018fc62db431

          SHA512

          16556370f900b14129ecc7211f3d74d2fe4839f6cb5fb04d66881287f1a439e6c27ee029258b3662a9bca123f304f7a57a318c3f9cf23cf170b669d023fbb131